Adaptive Anonymous Authentication for Wearable Sensors in Wireless Body Area Networks
暂无分享,去创建一个
[1] Qian Li,et al. Energy-efficient key agreement protocols for wireless body area networks , 2015, Int. J. Embed. Syst..
[2] Qian Li,et al. Efficient authenticated key exchange protocols for wireless body area networks , 2015, EURASIP Journal on Wireless Communications and Networking.
[3] Jheng-Jia Huang,et al. ROBUST AND PRIVACY PROTECTION AUTHENTICATION IN CLOUD COMPUTING , 2013 .
[4] Cas J. F. Cremers,et al. The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols , 2008, CAV.
[5] Sherali Zeadally,et al. Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.
[6] Kyung Sup Kwak,et al. Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[7] Fan Zhang,et al. OPFKA: Secure and efficient Ordered-Physiological-Feature-based key agreement for wireless Body Area Networks , 2013, 2013 Proceedings IEEE INFOCOM.
[8] Xiaohui Liang,et al. Wanda: Securely introducing mobile devices , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[9] Honggang Wang,et al. Secure and efficient key generation and agreement methods for wireless body area networks , 2017, 2017 IEEE International Conference on Communications (ICC).
[10] Maged Hamada Ibrahim,et al. Secure anonymous mutual authentication for star two-tier wireless body area networks , 2016, Comput. Methods Programs Biomed..
[11] Xianbin Wang,et al. Physical Layer Authentication Enhancement Using Maximum SNR Ratio Based Cooperative AF Relaying , 2017, Wirel. Commun. Mob. Comput..
[12] Prosanta Gope,et al. A Realistic Lightweight Anonymous Authentication Protocol for Securing Real-Time Application Data Access in Wireless Sensor Networks , 2016, IEEE Transactions on Industrial Electronics.
[13] Xiong Li,et al. Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks , 2017, Comput. Networks.
[14] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[15] Zhiguang Qin,et al. Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks , 2015, IEEE Transactions on Information Forensics and Security.
[16] Lili Wang,et al. Energy Efficient Transmission Approach for WBAN Based on Threshold Distance , 2015, IEEE Sensors Journal.
[17] Mohammed Abdullahi,et al. An Efficient Next Hop Selection Algorithm for Multi-Hop Body Area Networks , 2016, PloS one.